Author of the publication

An address-light, integrated MAC and routing protocol for wireless sensor networks.

, , and . IEEE/ACM Trans. Netw., 14 (4): 793-806 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Batch Verification of ECDSA Signatures., , , , , and . AFRICACRYPT, volume 7374 of Lecture Notes in Computer Science, page 1-18. Springer, (2012)Use of SIMD Features to Speed up Eta Pairing., , , , , and . ICETE (Selected Papers), volume 455 of Communications in Computer and Information Science, page 137-154. Springer, (2012)A comparative study of video transfer over Bluetooth and 802.11 wireless MAC., and . WCNC, page 2053-2057. IEEE, (2003)An address-light, integrated MAC and routing protocol for wireless sensor networks., , and . IEEE/ACM Trans. Netw., 14 (4): 793-806 (2006)Flooding-resilient broadcast authentication for VANETs., , , , , , and . MobiCom, page 193-204. ACM, (2011)VANET alert endorsement using multi-source filters., , , , , , , and . Vehicular Ad Hoc Networks, page 51-60. ACM, (2010)Throughput-optimal configuration of fixed wireless networks., , and . IEEE/ACM Trans. Netw., 16 (5): 1161-1174 (2008)SIMD-based Implementations of Eta Pairing Over Finite Fields of Small Characteristics., , , , and . SECRYPT, page 94-101. SciTePress, (2012)What is the right model for wireless channel interference?, , and . QSHINE, page 2. ACM, (2006)New algorithms for batch verification of standard ECDSA signatures., , , , , and . J. Cryptographic Engineering, 4 (4): 237-258 (2014)